Friday, June 27, 2008

Things to take note to prevent e-auction fraud when a consumer participating in an e-auction



Auction is market mechanism by which buyers make bids and sellers place offers. The most popular type of auctions is an electronic auction which means auctions conducted online.

31% of online Americans (35 million people) who participated in online auctions in 2000, 41% encountered problems. Checks were cashed without goods being sent (or vice versa) and the average loss per victim was $326. The obvious safeguards were not known or not used. Only 17% paid with credit cards and a mere 6% employed an escrow service.

The largest Internet auctioneer is eBay which has introduced several measures in an effort to reduce fraud. Following are action to prevent e-auction fraud:

1. User identity verification such in IC number, driver’s license number or date of birth. For example, verified eBay user, the voluntary program, encourages users to supply eBay with information for online verification.

2. Authentication service is to determine whether an item is genuine and described appropriately. It difficult to perform because their training and experience, experts can detect counterfeits based on subtle detail.

3. Grading services which is a way to determine the physical condition of an item, such as 'poor quality' or 'mint condition'.

4. Feedback forum allows buyers and sellers to build up their online trading reputations. It provides user with ability to comment on their experiences with other.

5. Insurance policy. For example, eBay offers insurance underwritten, users are covered up to $200, will with a $25 deductible. The program is provided at no cost to eBay user.

6. Escrow services. Both buyers and sellers in a deal are protected with an independent third party. Buyer mails the payment to escrow services which verifies the payment and alerts the seller when everything checks out.

7. Non-payment punishment. To protect sellers, a friendly warning for first-time nonpayment. A sterner warning is for second-time offense, with a 30 day suspension for a third offense and an indefinite suspension for a fourth offense.

8. Appraisal services which use a variety of methods to appraise items. It includes expert assessment of authenticity and condition, and reviewing what comparable items have sold for in the marketplace in recent months.

9. Item verification which is a way of confirm he identity and evaluate the condition of an item. Third parties will evaluate and identify an item through a variety of means. It provides a way of tracking an item if it charges ownership in future.

10. Physical inspection. It can eliminate many problems especially for collectors’ item.

Wednesday, June 25, 2008

Mobile payment systems in Malaysia: Its potentials and consumers’ adoption strategies

Malaysia being a country with over 25 million in population and 21 million mobile subscribers as at the end of year 2007, there is definitely market opportunity for mobile payment system.


The current mobile payment system that is available in Malaysia is Mobile Money (MM Wallet). Mobile Money is a PIN-based Mobile Payment Solution designed by Mobile Money International Sdn Bhd to address the limitations and bottlenecks created by cash, cheques and credit cards. It allows registered users to pay for goods and services at anytime, anywhere using only a mobile phone coupled with a 6-digit security PIN via SMS.

In order to pay using Mobile Money, a shopper must have either a savings, current or credit card account with participating banks. It functions like a Credit Card if a shopper applies for a "Pay by Mobile Phone" credit card account (eg: Hong Leong Mobile Credit Card) and it functions as a Debit Card if it is tied to shopper's savings or current account.

In order to encourage consumers to adopt mobile payment system, we must know what are the advantages of mobile payment system. The following are some of the advantages of mobile payment system:

Queue avoidance

Enhanced payment instrument availability

Complement to cash

Digital content and services, e.g. ticketing

Small value purchases at point of sale, e.g. vending

Trust in m-payment service providers, e.g. Banks

Can be use when suddenly need for payments

Can be use when lack of other payment instruments

• Need to make payments remotely

Tuesday, June 24, 2008

Credit Card debts:Causes and Prevention

Credit card debt is an example of unsecured consumer debt. It is like gaining weight - easy to get; hard to lose. But losing weight is not impossible; neither is getting out of debt. Owing a lot of credit card debt is not uncommon. Many consumers use credit cards as a "crutch." If they can't afford something they really want, they charge it. When it comes the time to pay the bill they are only able to make the minimum payment and soon find that their balances are increasing, which causes even more frustration and stress.This is where credit card debt arises where debt accumulates and increases via interest and penalties.

Causes of credit card debts:

1) Poor money management- Without monthly spending plan, you have no idea where your money is going. You may be spending unnecessarily each month and end up having to charge purchases on which you should have spent that money.

2) Banking on a windfall- Spending tomorrow's money today is very tempting. Especially if you believe that tomorrow will come no matter what. It is better don't spend the money until the check clears.

3) Financial illiteracy- Many people don't understand how money works and grows, how to save and invest for a rainy day, or even why they should balance their checkbook. You are responsible for your life and your money anyway. Financial mistakes are increasingly expensive and complicated to resolve. Get educated and get in control.

Prevention of credit card debts:

1) Set up a budget and stick to it. Be realistic about your expenses and your financial needs, then draw up a detailed monthly plan.

2) Cut up your cards so that you are not tempted to use them. Save one card for emergencies.

3) Get a low interest credit card if your credit card's interest rate is excessive. The better your credit, the lower the rate for whichy you will qualify.

4) Carry a credit card balance for no longer than six months. Beyond that point, the compounding of simple interest can produce a very expensive balance to pay off. If it helps, think of your credit card balance as a snowball that grows larger as it rolls downhill.

5) Be aware that balance transfer credit cards' teaser rates won't last forever. Six months is common now. The "normal" rate will return sooner than you think, so use that interest-free period to aggressively pay down balances.

Electronic Currency

Bitpass was an online payment system for digital content and services. Kurt Huang was a co-founder. Doug Knopper was hired as CEO in November, 2005. Bitpass was a California corporation with headquarters in Silicon Valley. It was founded in December, 2002 and partnered with major technology and financial services companies such as Microsoft, Paypal, the Royal Bank of Scotland and First Data.


On January 19th 2007, Bitpass announced that they were shutting down, and operations officially closed on January 26th 2007. No immediate reason for closure was given.
For the content buyer, Bitpass worked like a pre-paid telephone card: the buyer signed up for the service and put money into an account using a credit card or Paypal. This stored-valued amount could be used to purchase digital content or services.



Transaction fees were paid by the content provider. For payments under $5, the charge was 15% of the price paid by the buyer (Bitpass Professional merchant account fee).


There was a person named Winnie who worked for Bitpass before said that Bitpass was actually making pretty good money until stakeholders who were funding them pressured them to get out of the adult content business, neglect indeed content creators and spend all of their resources on going after big media.


Winnie further said that it was conceivable that a micropayments company that is allowed to grow organically can succeed, but when investors are knocking at your door offering tens of millions of dollars, it is very hard to resist selling out.

The Application Of Pre-paid Cash Card For Consumer


Pre-paid cash card is a stored-value card, which has monetary value loaded onto it and that is usually rechargeable. The monetary value of a pre-paid cash card is preloaded on the card.

A pre-paid cash card can be used to make purchases, either online or off-line. It can be used in the same way that credit card and debit card are used. Pre-paid cash card relying on the same networks as credit and debit card be, encrypted communications, and electronic banking protocols.


But there is one thing differentiate pre-paid cash card from credit card and debit card, that is, anyone can obtain a pre-paid cash card without regard to prior financial standing or having an existing bank account as collateral. One can start using a pre-paid cash card by just loading money onto the card at bank, post office, ATM machine and so forth.

There is a benefit when using the pre-paid cash card-no risk of running into debt. A card holder can only spend up to the amount loaded onto the card as there are no credit or overdraft functions provided for pre-paid cash card holders.

Examples of pre-paid cash card:
  • Touch 'n Go card (Malaysia)-This card can be used in entire highways stretches in Malaysia with the familiar TnG and SmartTag sign marked on the road. Besides, it can also be used for public transportation and ticketless parking. And soon, using Touch 'n Go card to buy fast food in Malaysia will be a reality.
  • Octopus Card (Hong Kong)- This card can be used in all public transport in Hong Kong. It can be used for payment at convenience stores, supermarkets, fast-food restaurants, on-street parking meters, car parks, and other point-of-sale applications such as service stations and vending machines. Besides, it can also be used for access control in buildings and for school administrative functions.

Applications of pre-paid cash card for consumer:
  • Online shopping
  • Payment for petrol
  • Public transportation
  • Payment for toll fare
  • Bill payment
  • People who are travelling in other country
  • Topping up for mobile phone

To read more regarding Pre-paid cash card, please refer to the following links:

Friday, June 20, 2008

The THREAT of online security: How SAFE is our data?

Passwords, firewalls, encryption, two-factor authentication and access-control lists are among the tools available to information security professionals. Other options include system audits, patch management, network traffic monitoring and penetration testing. And a range of information security training programs and certifications are available to best use these tools.

However, despite this arsenal and well-trained professionals securing networks and systems, businesses cannot completely stop the flow of proprietary data, trade secrets and confidential information leaving their organizations and ending up in the hands of competitors, journalists and whistleblowers.

Employees must have access to proprietary information to perform their job responsibilities. The current attitude toward electronic data is that we must be able to access it from anywhere we are working and we should be able to share it with co-workers, business associates and vendors, such as, with the click of a mouse.


This ability to access and disseminate data quickly and easily is great from a productivity viewpoint, but frightening from a security perspective.

Explaining how much data can be removed by employees may cause management to support the control of who has the ability to copy data to a USB flash drive.

There are mechanisms that can be implemented to reduce data loss via these devices. On newer systems, it is possible to disable USB ports in the BIOS. While this limits data loss, it also prevents the use of other, helpful, devices. It is possible to modify the Registry (XP SP2) to make USB devices read only.

Create a new key, HKLM\SurrentControlSet\Control\StorageDevicePolicies. Then create a REG_DWORD entry called "Write Protect." Set the value to "1" and USB flash drives will now be read only.
Another option that might work for some organizations is to set a Group Policy Object modifying permissions to the file usbstor.sys (located at C:\Windows\system32\drivers on a Windows XP system), allowing access to "System" and perhaps "Administrator."

Review On A Post On Internet Security From E-Commerce blog: New Spamming Tactics

Spamming is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages. It is the flooding of electronic mail systems with 'junk e-mail'. While the most widely recognized form of spam is:
  • E-mail spam ~ is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.

  • Instant messaging spam ~ makes use of instant messaging systems, such as Window Live Messenger. Many instant messaging systems offer a user directory, including demographic information that allows an advertiser to gather the information, sign on to the system, and send unsolicited messages.

  • Wed search engine spam~ the practice on the World Wide Web of modifying HTML pages to increase the chances of them being placed high on Search engine relevancy lists.


  • Mobile phone messaging spam~ is a form of spamming directed at the text messaging service of a mobile phone.

  • Newsgroup spam ~ is a type of spam where the targets are Usenet Newsgroups.

Spam can be used to spread computer viruses, trojan horses or other malicious software. The objective may be identity theft, or worse. Some spam attempts to capitalize on human greed whilst other attempts to use the victims' inexperience with computer technology to trick them. For example, phishing.


An anti-spam software can helps to reduce the influx of the unsolicited e-mails tremendously, where spam mails are easily filter out and diverted to the spam folders. But yet, this anti-spam software is not a complete solution to the spam problems. The spammers are now coming out with new tactics to outsmart this anti-spam software. These new tactics are: PDF spam, piggyback spam, and greeting card spam.


However, there are still have solution to overcome these new tactics:


  • PDF spam ~ If you come across any e-mail message that has a PDF file attached but no text in the message area, just delete it.


  • Piggyback spam ~ If you receive any e-mail from a retailer you’ve never heard or agreed to receive email from, just delete it immediately.


  • Greeting card spam ~ Delete any e-card received from unknown person.

Other than the above solutions, we can also use the following steps to avoid the spamming problems:

  1. Before clicking on any links, hovers your mouse cursor over the link.


  2. A full Internet address will appear.


  3. Study the full Internet address for a moment, even if you do not know exactly how to interpret it.


  4. If you see numbers or words does not correspond to the company that send you the email, delete it immediately.


  5. If you see an “.exe” or “.com” at the end of the address, delete it immediately too.


  6. Flag the spam for your spam filter to improve it catch rate.

To read more regarding spamming, please refer to the following link:

Tuesday, June 17, 2008

How to safeguard our personal and financial data?


Identity theft has become one of the most frightening non-violent crimes of the 21st century and has become all too common. According to the Privacy Rights Clearinghouse, 9.3 million Americans fell victim to identity theft in 2005; and while this number has been decreasing slowly since then, identity theft still poses a serious threat.

In response to this problem, here are some tips to keep your personal and financial data safe.

1) Use caution when disclosing
Never give personal information over the telephone and use caution when disclosing checking account numbers, credit card numbers, or other personal financial data at any Web site or on-line service location unless you receive a secured authentication key from your provider.

2) Shred old documents.
One of the ways to protect yourself against potential fraud or identity theft is to eliminate your own paper trail. Never leave receipts at bank machines, bank counters, trash receptacles, or unattended gasoline pumps. Keep track of all your paperwork. When you no longer need it, destroy it.

3) Be vigilant while using the Internet.
It's important to verify the validity of any requests for personal information before you give them out and make sure that you're not storing sensitive data on non-secure websites for example online calendars, to-do lists and organizers.
Also, check the url of the site.

4) Protect your computer's security.
Use as many tools as you can (anti-virus software, spyware, firewalls, and passwords) to guard your computer information from the nefarious.

5) Set Banking Alerts
Setting alerts for your accounts can ensure that you find out about unauthorized access as soon as possible.

6) Don't Reuse Passwords
It's a good practice to use a different password for every account. It can help marginalize the effects of unauthorized access to your accounts. Memorize your social security number and all of your passwords. Do not record them on any cards or on anything in your wallet or purse.

7) Avoid Enclosing Private Information on Public Computers
To play safe,private information should not disclose onto a computer used by the public and log out completely from your accounts, and never choose to save login information on these computers.

Hope that these tips can help you to safeguard your personal and financial data.

Monday, June 16, 2008

Phishing: Example and its prevention methods

In computing, Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing attacks are not new, what is new is the method. In the past, scam artists relied on the telephone. Today, they rely on spoofed e-mail (spam), fraudulent pop-up messages, or fake Web pages to fool victims into thinking they are dealing with a legitimate business.The message usually links unsuspecting recipients to Web site where they are asked to update or validate their account information.

Here is an example of phishing which use the name of PayPal to collect users’ information by instructing users to open the link provided in the e-mail. (See the example on the right and click to enlarge it)




To safeguard against phishing, users should always go to the website directly
(by typing in the URL to access the site) rather than via link in emails. Besides that, individuals are suggested to:

- Avoid replying to e-mail or pop-up messages that ask for personal information.

- Avoid sending personal or financial information.

- Review credit card and bank account statements.

- Use and keep antivirus software up-to-date.

- Be cautions about opening any attachment or downloading any files received via e-mail.

Friday, June 13, 2008

An Example Of E-Commerce Success And Its Causes


An example of an E-Commerce success is Google. Google was co-founded by Larry Page and Sergey Brin while they were students at Stanford University and the company was first incorporated as a privately held company on September 7, 1998.

Google is an American public corporation, earning revenue from advertising related to its internet search, web-based e-mail, online mapping, office productivity, social networking, and video sharing as well as selling advertising-free versions of the same technologies. The Google search engine attracted a loyal following among the growing number of internet users, who liked its simple design and usability.

There are 4 main factors how Google success:

Business Model Innovation. By perfecting the nature of targeted ads, Google not only has created a highly effective revenue generator, it has produced what it hopes to be a better experience for its users. It is Google's goal to make their targeted ads at least as relevant and useful to users as the search results themselves.

Brand. According to Drummond, a European study recently determined Google to be the number one most recognized worldwide brand. Indeed, Google has become a verb ("I can't wait to get home and Google him") which poses real challenges to a company seeking to protect the strength of its mark.


Focus On The User Experience. Product decisions at Google are driven by optimizing for the user experience first and for revenue second. The folks at Google firmly believe that the better the user experience, the more easily money will follow.

Thursday, June 12, 2008

An example of an E-Commerce failure and its causes



1-800 MUSIC NOW was a short-lived venture by MCI Communications to open a music store operated through automated telephone and online prompts. It also introduced one of the first ever serious attempts at an e-commerce music store. The service was run out of MCI's offices in Arlington, Virginia (Pentagon City).

The telephone service allowed United States users who dialed the toll free number 1-800-687-4266 to enter the name of a performing artist by touch-tone, then select one of that artist's albums (available on CD or cassette) from the catalog and hear clips from that album before buying by credit card. Once users made selections on the automated service, they were transferred to a call center where an operator established an account, collected payment and shipping information, assisted in ordering, and completed the order.

The online service was located at http://www.1800musicnow.mci.com. It was the first to offer free music sampling for most of its catalog, initially in RealAudio 1.0 and eventually in RealAudio 2.0. The online store shut down in early 1997.

The service began in 1995 (the same year Amazon.com opened, and three years before it started selling music) but was taken down in December 1996. The promotion totaled about USD $40 million. Meanwhile, its top-selling CD allegedly sold only 400 copies. Ultimately, over 1 million pieces of music were sold within the year. One survey noted that many who called the number did not sign up to make purchases, some citing shipping fees, but most saying that they didn't have credit cards.

That failure was attributed in the press to a variety of causes, including:
1. weakness in the music industry on that particular year, leading to deep discounting by retailers;
2. site was not easy to use; consumers prefer ordering through traditional stores;
3. Prices were relatively high, compared once again to traditional stores.

How e-commerce can reduce cycle time, improve employees' empowerment and facilitate customer support?

Cycle time
E-commerce can reduce cycle time. In other words, it shortening the time needed for a business to complete a productive activity from its beginning to end. It is extremely significant for increasing productivity and competitiveness for a company.

The uses of e-commerce causes the elimination of intermediaries which exist in a traditional distribution channel. This process also known as disintermediation. The intermediaries refer to third party which exist between the sellers and buyers. For example, wholesalers, distributors, and retailers. By using e-commerce, the intermediaries can be eliminated. The manufacturers or sellers can bypass the wholesalers, distributors and retailers, selling directly to the customers.

For example, passengers can access to AirAsia website and booking air tickets directly from AirAsia. Passengers can book their air tickets through Internet and need not book through a travel agent. The intermediary has been eliminated and causes the reduction in time cycle.

Employees' Empowerment
E-commerce can improve a company's employees empowerment by giving them the authority to act and make decisions on their own. Management can delegate authority to individual or a team of employees who can then execute the work faster and with fewer delays.

For example, sales persons and customer service employees are empowered and given the authority to make their own decisions regarding sales and customer service problems through the uses of e-commerce in order to increase to customer loyalty.

Customer Support
As a subsequents of digital revolution, the bargaining power of customers is stronger than ever, and that power is growing. The availability of information and the ability to make quick comparisons online increases this trend. Customers are essential to a business because the success or failure of a business is depend on customers. Therefore, a company must make their customers happy in order to keep them.

For example, e-commerce can facilitate customers support through an online FAQ (frequently asked questions). If customers have doubts about how to collect their online booked air tickets, he or she can access to the airline website and search for the solution through FAQ site..

Tuesday, June 10, 2008

The history and evolution of E-commerce

History of ecommerce dates back to the invention of the very old notion of “sell and buy”, electricity, cables, computers, modems, and the Internet. E-commerce became possible in 1991 when the Internet was opened to commercial use. Since that date thousands of businesses have taken up residence at web sites.

E-commerce applications were first developed in the early 1970s and allowed business companies and organizations to send commercial documentation electronically with innovations such as electronic funds transfer(EFT),and electronic data interchange(EDI).

When the Internet became commercialized and users began flocking to participate in the World Wide Web in the early 1990s, the term electronic commerce was coined. Then E-commerce applications rapidly expended. One reason for this rapid expansion was the development of new networks, protocols, and E-commerce software. The other reason was the increase in competition and other business pressures.

Since 1995, Internet users have witnessed the development of many innovative applications, ranging from online direct sales to e-learning experiences. In 1999, the emphasis of E-commerce shifted from B2C to B2B, and in 2001 from B2B to B2E, c-commerce, e-government, e-learning, and m-commerce. Given the nature of technology and the Internet, E-commerce will undoubtedly continue to shift and change. More and more E-commerce success are emerging.

By the end of 2001, the largest form of E-commerce, B2B, had around $700 billion in transactions. According to all available data, E-commerce sales continued to grow in the next few years and, by the end of 2007, E-commerce sales accounted for 3.4 percent of total sales.Overall, the growth of the field will continue to be strong into the foreseeable future. Despite the failures of individual companies and initiatives, the total volume of E-commerce is growing by 15 to 25 percent every year.

History of E-commerce is a history of a new, virtual world which is evolving according to the customer advantage. It is a world which we are all building together brick by brick, laying a secure foundation for the future generations.

Friday, June 6, 2008

Self-Introduction(Lim Teng Cherng)

My name is Lim Teng Cherng. I'm also known as TC. I'm currently engaged in Year 3 Sem 1 Bachelor of Accounting,UTAR. I took up this seem-to-be boring and dull course not because of my personal interest, but due to parental advice and good future prospects. I'm particularly weak in accounting and audit subjects, most probably due to the poor effort that i put in or maybe i just take it for granted.Any reasons behind it?i'm still figuring it out. Hopefully i'm able to make it right and strike for at least a second upper position (which i think is extremely important to secure a good job later)before graduating.

I'm from a small happy family consisting of my parents and a great younger sister. She's doing law at the moment. She's far more hardworking than i am,and i'm very proud of her. My father is a businessman. To me, he's the most knowledgeable creature on earth i hv ever met.This always makes me wonder whether i'm fit to be his son.He's like a friend and mentor to me.Unlike those typical fathers in Malaysia that seldom chat with their children, my father use to have supper with me at least twice a week and we chat about everything.From studies to gals.Anything. Whereas my lovely mother is currently engaged in her charity work.Almost fulltime. When i'm most down in studies, she's the one who inspires me and put me back on track. i'm very very lucky to have such a great family. Hope i can pay back one day.

Besides my nucleus family members, there are also few VVIPs in my life. Grandma, godfather, gf, and a few great great friends. Grandma, a happy-go-lucky person. Whenever i'm down, she's the best consultant. I met my godfather since 10.1.2007.Great mentor to me.A successful person as well, in terms of wealth and career. Hope to be like him one day. Friends.Can never do without them. All much more clever than me and probably will be more successful than me one day. I meet great friends from time to time. There is now one interesting friend in pursue. That person knows it. Happy to have them.GF?private and confidential.

Badminton = my life. Basically can't survive without it. Even though i'm not very good at it, it has coloured and brightened up my 'teenagehood'. It can also be considered as a great friend.

Surfing the net has been part of my life as well.
1. http://www.yahoo.com/ - checking emails
2. http://www.msn.com/ - chatting online
3. http://www.friendster.com/ - keeping in touch with friends
4. http://www.worldbadminton.net/ - badminton stars and tournaments
5. http://www.menshealth.com/ - relationships and self improvement

Thursday, June 5, 2008

Self-Introduction (Leong Chooi Sim)

My name is Leong Chooi Sim and i currently studying at Universiti Tunku Abdul Rahman, taking accounting course at Year 3 Sem 1. I'm 22 years old, young enough in workforce but consider as one of the oldest student in my class...

I'm now staying at Ampang, Selangor and i need to travel from Ampang to Sungai Long everyday. Fortunately there is no serious traffic jam problem along the way from Ampang to Sungai Long. Special thanks to my sincere and beloved friend who fetching me to UTAR everyday.

When I'm home, i always need to look after my little nephew. He is only 1 year old but his strength can be compared with a six years old children, ripley's believe it or not. He is cute but very naughty, always mess up my bookshelf, and my bedroom.
Besides, i always playing computer games, espacially 'Counter Strike'. 'Shooting' people in computer games really can help me to release my stress.
Eating, this things cannot be disappearred in my whole life, I'll keep on eating when i was sad, angry, and during exam.



The website that i always visit are:

http://www.8tv.com.my/ ~ Watching my favorite tv show 'So If U Think U Can Dance'...
It's really made me happy because i love to dance very much. And something really made me excited, i'm able to get the VIP tickets to watch this show live at Ruums, Kuala Lumpur. Thanks to my friends!
One of our UTAR Dance Club dance instructor, Tze Hong, is the top 20
finale!!

http://www.yahoo.com/ ~ I'm only checking my e-mail in this website.

http://www.friendster.com/ ~ Keep in touch with all my friends.

http://www.hotmail.com/ ~ Checking mail also.

http://www.google.com/ ~ Using its search machine.




Self-introduction(Neo Li Juan)

My name is Neo Li Juan, you can call me neo. I am 21 years old. I come from Batu Pahat, Johor but I am currently studying in UTAR and taking accounting course. So, I am staying in Cypress condominium, Sungai Long now. I like a lot of animals but i hate cat because it let me feel that cat is evil. I have 2 dogs(BiBi and Man) and 7 birds at my hometown now.

I like to play mahjong but my luck is so bad, every time also lose. This game can train my brain and bring my friends and I become closer because we always chat during that time.It is quite fun and I really enjoy it. I also like outdoor activities,for example jungle trekking, jogging, cycling,travelling, gardening and etc. But now I seldom do these already because there is no environment and no people accompany me to do. (One person doing is so bored)

My hometown Batu Pahat is a very nice place.I heard that Batu Pahat is famous with coffee???I really don't know...haha, but Batu Pahat has many delicious food to eat and the seafood is quite fresh. I miss my hometown food so much! Luckily I go back quite frequently. I really love my hometown.

The website that I always visit are as follow:
http://www.viwawa.com/
http://www.hotmail.com/
http://www.friendster.com/
http://www.ericsoo.com/
http://www.jbtalks.com/

Wednesday, June 4, 2008

Self-Introduction (Lim Hau Chin)


My name is Lim Hau Chin (Alvin), 21 years old. I am a Year 3 Sem 1 student and currently engaged my Accounting Degree in Universiti Tunku Abdul Rahman, Sungai Long campus. I live in Batu Pahat, Johor but currently stay in Cypress Condominium, Sungai Long with some of my friends who are also from Johor.

There are 7 members in my family which include my parents, 1 elder sister, 1 younger brother,
2 younger sister and me. My father is a businessman and my mother assist him in his business. My father is my hero, although he study not much due to poor background, but he know a lot of "theory of human being", so he always teach me a lot of things which cannot learn from school. My mother is my father's best assistent and also a best mother for me, she didn't complain how many workload she has and just keep doing without saying a word. All my siblings are currently conducting their studies except my elder sister who is temporarily unemployed. I am very lucky to have such a good family and i love all of them.


I am a boy (because i think i am not qualified enough to be a man) who like to play computer games and badminton. I usually play badminton with my friends at least once a week except when the exam weeks are around the corner. Among all the badminton players, I like Lin Dan, who are from China the most because he is handsome and also very expert in playing badminton.He is the champion in man single badminton competition until now, i hope one day i can become expert like him (10% of his expertise is enough)

The website that i always visit are:
http://www.google.com/ -- The search engine i like the most
http://www.yahoo.com/ -- I use yahoo mail to send and receive my e-mail (personal)
http://www.hotmail.com/ -- I use hotmail mail to send and receive my e-mail as well
http://www.friendster.com/ -- The website that I keep my old and new friends connected
http://www.viwawa.com/ -- Not only online games, but also include chit chat, my viwawa name is "blursun87", welcome all the challenger